part - iv computer science - solutionsadda
TRANSCRIPT
![Page 1: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/1.jpg)
Part - IV Computer Science
71. Which of the following algorithms use recursion for sorting an array of integers? A. Bubble sort and Insertion sort B. Bubble sort and Quicksort C. Bubble sort and merge sort D. Quicksort and merge sort
72. ______ operation preserves those tuples that would be lost in____ A. Natural join, outer join B. Outer join, natural join C. Left outer join, right outer join D. Left outer join, natural join
73. Social network analysts use ____ to access facebook data A. Facebook system calls B. Facebook APIs C. Facebook Scripts D. Facebook System Libraries
74. In which of the topology, each device has a dedicated point-to-point link to a central controller? A. Mesh B. Bus C. Ring D. Star
75. While making bubbled lists, which of the following options are available? A. Square,disc,tringle B. Triangle,disc,circle C. Triangle,square,circle D. Disc,square,circle
76. Resolution of externally defined symbols is performed by____ A. Linker B. Loader C. Compiler D. Editor
77. In which case it is mandatory to provide a destructor in a class? A. Almost in every class B. Class for which two or more than two objects will be created C. Class for which copy constructor
![Page 2: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/2.jpg)
D. Class whose objects will be created dynamically
78. Action implementing instructor’s meaning are actually carried out by____ A. Instruction fetch B. Instruction decode C. Instruction execution D. Instruction program
79.Given a relation schema R(ABCDEFGH) in first normal form. For the set of dependencies F={ A→ B, A→ C, CG→ H, B→ H, G→ F}, which dependency is logically implied? A. AC→ H B. C→ H C. G→ H D. A→ H
80. To load a byte of data parallelly into a shift register with a synchronous load, there must be__ A. One clock pulse B. One clock pulse for each 1 in the data C. Eight clock pulses D. One clock pulse for each 0 in the data
81. Which of the following is the correct declaration of linked list? A. Struct node* { Int data; node*link; } B) Struct node { int data; Struct node*link; } C) Struct node { int data; node link; } D) Struct node* { int data; struct node*link; }
82. The operation executed on data stored in registers is called____ A. Macro operation
![Page 3: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/3.jpg)
B. Micro operation C. Bit operation D. Byte operation
83. Which of the following is true about time value assignment in VBscript? A. The time value should be assigned without double quotes(“). B. The time value should be enclosed within double quotes(“). C. The time value should be enclosed within single quotes(‘); D. The time value should be enclosed within hash symbols(#).
84. Shifting a register content to left by one bit is equivalent to____ A. Division by 2 B. Addition by 2 C. Multiplication by 2 D. Subtraction by 2
85. Consider the relation Emp-Dept with SSn as key Ename SSn EAddr Dept.No Dept.Name Dept. Manager SSn Which of the following is (are) invalid operation(s)? a) Inserting an employee without name and address b) Inserting an employee with only SSn c) Inserting a department with no employee d) Inserting an employee without SSn
86. What shall be the 2’s complement represented of -24 in a 16 bit computer? A. 1111 1111 1110 1011 B. 1111 1111 1110 1001 C. 1111 1111 1110 0111 D. 1111 1111 1110 1000
87. Which of the following is/are wrong? a) RAM and ROM are volatile memories b) ROMs,PROMs and EPROMs are non volatile memories c) RAM and Dynamic RAM are same d) A random access memory(RAM) is a read write memory A. (a) and (b) B. (a) and (c) C. (a) and (d) D. (c) and (d)
88.The process of removing deficiencies and loopholes in the data is called as____ A. Data aggregation B. Extraction of data C. Compression of data
![Page 4: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/4.jpg)
D. Cleaning of data
89. Consider the following three binary trees, each with 7 nodes
Then A is____binary tree, B is ___binary tree and C is_______ binary tree. A. Strictly,Strictly,complete B. Complete,no strictly, strictly C. Strictly,not strictly,strictly D. Strictly,not strictly,complete
90. The electromagnetic waves ranging in frequencies between 1 GHz and 300 GHz are called____ A. Radio waves B. Microwaves C. Infrared waves D. Light waves
Given the following expression tree,identify the correct arithmetic expression:
A. (A+B)*/A-C B. A+(B*C)/(A-C) C. A+B*C/A-C
![Page 5: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/5.jpg)
D. (A+B*C)/(A-
Given the following two statements about SQL (a) An SQL query can contain HAVING clause only if it has GROUP BY clause. (b) In an SQL query “SELECT_FROM_WHERE_GROUP BY_HAVING”, HAVING is executed before WHERE. Which of the following is correct? A. (a) and (b) are true B. (a) is true, (b) is false C. (a) is false, (b) is true D. (a) and (b) both are false
93. Which of the following protocol is used for transforming electronic mail messages from one machine to another? A. FTP B. SMTP C. SNMP D. STTP
94. Exclusive OR(XOR) is a special gate whose output is 1 only if: A. All inputs are 0 B. All inputs are 1 C. Odd numbers of inputs are 1 D. Even number of inputs are 1
95. MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes_____frames. A. Voice B. Spatial C. Temporal D. Redundant
96. Hardware mechanism that enables a device to notify the CPU is called: A. Busy-waiting B. Interrupt C. Polling D. DMA
97.The device bridge is used at ____ layer of OSI reference model. A. Datalink B. Network C. Transport D. Application
![Page 6: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/6.jpg)
98. Runtime polymorphism is achieved by _____ A. Friend function B. Virtual function C. Operator overloading D. Function overloading
99. How many characters per second (7 bits+1 parity) can be transmitted over a 2400 bps line if the transfer is asynchronous(1 start and 1 stop bit)? A. 240 B. 250 C. 275 D. 300
100. Which of the following flipflops does not have a problem of race condition? A. T flip flop B. JK flip flop C. Clocked-RS flip flop D. Clocked D flip flop
101.Time taken to switch between user and kernel models is___the time taken to switch between two processes. A. More than B. Independent of C. Less than D. Equal to
102.The worst case complexity for searching an element in binary search tree is: A. O(lgn) B. O(nlogn) C. O(n2) D. O(n)
103. The period of a signal is 100ms. What is its frequency in kilohertz? A. 10-1 kHz B. 10 -2 kHz C. 10-3 kHz D. 10-4 kHz
104.How many page faults occur in LRU page replacement algorithm for the given reference string, with four page frames 7,0,1,2,0,3,4,2,3,0,3,2,1,2,0,1 A. 6 B. 8 C. 7 D. 9
![Page 7: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/7.jpg)
105. Usually pure virtual function A. Has complete function body B. Will never be called C. Will be called only to delete an object D. Is defined only in derived class
106.Von neumann computer architecture is____ A. SISD B. SIMD C. MIMD D. MISD
107. ____key must satisfy referential integrity in a relation, while__key must satisfy entity integrity. A. Candidate, primary B. Foreign,primary C. Primary,foreign D. Foreign,superkey
The _____property is used to return or sets value determines whether the conrolcan respond to user generated events. A. Auto B. Enable C. Value D. Visible
109. Use of virtual function implies____ A. Overloading B. Overriding C. Static binding D. Dynamic binding
110.Machine that places the request to access the data, is generally called as___ A. Server machine B. Client machine C. Request machine D. Intelligent machine
111. Given a set of four, two resources with two units, each. The following resources allocation graph exits at a point in time:
![Page 8: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/8.jpg)
The graph indicates: A. Cycle and deadlock B. No cycle but deadlock C. Neither cycle nor deadlock D. Cycle but no deadlock
112. Which of the following applications may use a stack? (a) Parenthesis balancing program (b) Process scheduling operating system (c) Conversion of infix arithmetic expression to postfix form A. (a) and (b) B. (b) and (c) C. (a) and (c) D. (a),(b) and (c)
113. Consider the following code segment in C++. How many times the for loop will be repeated? int main() { Int f=1; for(;f;) cout<<”f=”<<f++<<”\n”; Return 0; } A. 10 times B. Not even once C. Repeated forever D. Only once
114. Which of the following are language processor? A. Assembler and editor B. Compiler and word processor C. Only Assembler and compiler D. Assembler,Compiler and Interpreter
![Page 9: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/9.jpg)
115. Consider the following code segment: Int x=22,y=15; x=(x>y)?(x+y):(x-y); What will be the value of x after the code is executed? A. 22 B. 37 C. 7 D. 37 and 7
116. How many gate(s) would be required to implement the following boolean expression after simplification? Expression: A’(C’D’+C’D)+AB(C’D’+C’D)+AB’C’ A. 1 B. 2 C. 3 D. 4
117. Given below are several usages of the anchor tag in HTML. (a) <A href=”http://w3c.org/test.html”> (b) <A href=”/HTML/test.html”> Test</A> (c) <A href=”test.html”>Test</A> (d) <A href=”test.html#top”>Test</A> Which of the above are valid? A. (a) and (b) only B. (a),(b) and (c) only C. (b),(c) and (d) only D. (a),(b),(c) and(d)
118. The function setcookie() is used to____ A. Enable or disable cookie support B. Declare cookie variables C. Store data in cookie variables D. Clear data from cookie variables
119. In which of the following, the density of the core remains constant from the center to the edges? A. Single mode fiber B. Multimedia step-index fiber C. Multimode graded index fiber D. Single mode step index fiber
120. A device which converts BCD to seven segment is called____ A. Encoder B. Decoder C. Multiplexer D. Demultiplexer
![Page 10: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/10.jpg)
121. Additional information sent when an exception is thrown may be placed in___ A. The throw keyword B. The function that caused the error C. The catch block D. An object of the exception class
122. When a mobile telephone physically moves from one cell to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as____ A. Handoff B. Mobile routing C. Mobile switching D. Cell Switching
123. Which of the following expression results in zero? A. (0+0+1)(0+0+1) B. (0+0+0)(0+1+1) C. (1+0+0)(1+1+1) D. (0+1+0)(1+0+1)
124.Which of the following is a special effect in motion pictures and animation that changes one image/picture into another through a seamless transition? A. Modeling B. Morphing C. Animating D. Wrapping
125.______ variables are not reinitialized each time visual basic invokes a procedure and thus retains or preserves value even when a procedure ends A. Static B. Dynamic C. Virtual D. Private
126. Which of the following is not correct in C++? A. x-=2; is the same as x=x-2; B. x*=2; is the same as x=x*2; C. x%=2; is the same as x=x/2; D. x/=2; is the same as x=x/2;
127. Consider the following Java code segment: Public class while /*line1*/ { Public void loop()
![Page 11: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/11.jpg)
{ Int x=0; while(1) /*line 6*/ { system.out.println(“x plus one is”+(x+1)); } } } Which of the following is true? A. There is a syntax error in line -1 B. There are syntax errors in,line -1 and line -6 C. There is a syntax error in line -6 D. No syntax error
128. The Communication between the components in a microcomputer takes place via the address and ____ A. I/O bus B. Data bus C. Address bus D. Control lines
129. Which of the following statements is incorrect? A. Data definition languages is used by DBA and database designers to define schemas B. Storage definition language is used to specify the internal schema. C. Storage definition language is used to insert,delete and update data D. Data definition languages is used to retrieve data from the database
130. Given the list of tasks in Col-A and list of data structure in Col-B. Identify the best match A B
(a) Recursion (i) Binary tree
(b) Scheduling (ii) stack
(c) sorting (iii) Queue (a) (b) (c) A. (i) (iii) (ii) B. (ii) (i) (iii) C. (iii) (ii) (i) D. (ii) (iii) (i)
131. In the context of while loop do while loop in C++, which of the following is not true? A. Both the loops are repetitive in nature B. Boh are conditional loops C. Both will be executed at least once D. Both are terminated when the condition become false
![Page 12: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/12.jpg)
132. In single-precision, double-precision and extended-precision representation of floating point numbers, as defined by ANSI/IEEE standard 754-1985, the no.of bits used are____ respectively. A. 32,64 and 80 B. 32,64 and 128 C. 16,32 and 64 D. 16,32 and 80
133. Parent class of all java classes is____ A. Java.lang.system B. Java.lang.object C. Java.lang.class D. Java.lang,reflect.object
134. Following numbers(items) are inserted in order into binary search tree. 40,60,50,33,55,11 Then the number of items in left and right subtrees of the root are_____ A. (3,3) B. (2,3) C. (3,2) D. (2,4)
135. Which of the following method is used to refresh the webpage in javascript? A. window.reload() B. location.reload() C. window.refresh() D. page.refresh()
136. In Vb, to change the size of a dynamic array,___ is used at the point in the code where you want it to change A. Dim B. Redim C. Chdim D. Bydim
137. Consider the code segment written below in C++: if (count<10) //if#1 if((count%4)==2) //if#2 count<<”condition:white\n”; else //(indentation is wrong) count<<”condition is:tan\n”; There are 2 if statements and one else. To which if, the else statement belong? A. It belongs to if#1 B. It belongs to if#2 C. It belongs to both the if statements
![Page 13: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/13.jpg)
D. It is independent
138. An interface that provides I/o transfer of data directly to and from the memory unit and the peripheral is termed as_____ A. DDA B. Serial Interface C. BR D. DMA
139. The _____attribute of <TABLE> tag is used to control the distance between the data in a cell and the boundaries of the cell. A. Colspan B. Rowspan C. Cellpadding D. cellspacing
140. For which of the following tasks, stack is not suitable data structure? (a) Binary search in an array (b) Breadth first search (c) Implementing function calls (d) Process scheduling A. (b) and (d) B. (b) and (c) C. (a) and (c) D. (c) and (d)
141. Which of the following is correct? A. In asymmetric multiprocessing, the processor are peers. B. In symmetric multiplexing, the processors are placed symmetrically on the motherboard C. Clustered systems are used for high performance computing D. All multiprocessor systems are multicore systems
142. File operations that manipulate the ‘open-count’ maintained for each entry in open file table include: A. Open,write B. Read,write C. Write,close D. open,close
143. Given an instance of the relation R(ABCD). A B C D
a1 b1 c1 d1
a1 b2 c2 d2
![Page 14: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/14.jpg)
a2 b2 c2 d3
a3 b3 c4 d3 Which of the following functional dependencies hold? A. {AB} → D and D → A B. {AB → D and B → D C. {AB} → C and B → C D. {AB} → D and A → D
144. The simplified form of the boolean expression: (AB’(C+BD)+A’B’)C is: A. B’C B. A’B’C C. AB’C D. A’BC
145. When a circular queue is implemented in an array of the following condition holds when there is only one element in the queue? A. Front=rear=null B. Front=Rear!=null C. Front=Rear+1 D. Front=Rear-1
146. In a computer system, memory mapped access takes 100 nanoseconds when a page is found in TLB. In case the page is not TLB, it takes 400 nanoseconds to access. Assuming a hit ratio of 80%, the effective access time is: A. 120ns B. 160ns C. 200ns D. 500ns
147. Consider the following SQL query: (SELECT DISTINCT Pnum FROM PROJ,DEPT,EMP WHERE Dnum=Dnumber AND Mgr_ssn=Ssn AND Lname=’XXXX’) UNION (SELECT DISTINCT Pnum FROM PROJ,WORKS_ON,EMP WHERE Pnum=Pno AND ESSn=Ssn AND Lname=’XXXX’) This query retrieves: A. All project numbers for projects that involve an employee with last name ‘XXXX’, either as worker or as manager B. All project numbers for projects that involve an employee with last name ‘XXXX’ as manager C. Records of all employees with last name as ‘XXXX’ working in a project as manager D. All project numbers for projects in department Dnumber and where ‘XXXX’ is involved either as worker or as manager 148. The producer and consumer processes share the following variables:
![Page 15: Part - IV Computer Science - Solutionsadda](https://reader033.vdocuments.us/reader033/viewer/2022050207/626dbe5378ed9f143972ce3e/html5/thumbnails/15.jpg)
Int n, Semaphore M=1 Semaphore E=n Semaphore F=0 The consumer process must execute ______ and before removing an item from buffer. A. signal(M), signal(F) B. signal(M), wait(F) C. Signal(F), wait(M) D. wait(F), wait(M)
149. Which of the following is not true in case of public inheritance in c++? A. Each public member in the base class is public in the derived class B. Each protected member in the base class is protected in the derived class C. Each private member in the base class remains private in the base class D. Each private member in the base class remains private in the derived class
150. The elements of the triangular array are stored as a vector in the A[1,1], A[2,1],A[2,2],A[3,1] A[3,2], A[3,3]..A[n,n] Assuming that A[1,1] is stored at location 1, addressing function for A[i,j] is given by; A. (i-1)/2 +j B. ((i-1)*i)/2 +j C. (i*i)/2 +j D. (i*j-1)/2